Vulnerability Details : CVE-2021-33620
Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2021-33620
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
Threat overview for CVE-2021-33620
Top countries where our scanners detected CVE-2021-33620
Top open port discovered on systems with this issue
3128
IPs affected by CVE-2021-33620 2,224,232
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2021-33620!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2021-33620
6.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33620
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
MITRE | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2021-33620
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33620
-
http://seclists.org/fulldisclosure/2023/Oct/14
Full Disclosure: Squid Caching Proxy Security Audit: 55 Vulnerabilities, 35 0days.Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/
[SECURITY] Fedora 34 Update: squid-5.0.6-1.fc34 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2023/10/11/3
oss-security - Squid Caching Proxy Security Audit: 55 Vulnerabilities, 35 0days.Mailing List;Third Party Advisory
-
http://www.squid-cache.org/Versions/v5/changesets/squid-5-8af775ed98bfd610f9ce762fe177e01b2675588c.patch
Mailing List;Patch;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/
[SECURITY] Fedora 33 Update: squid-4.15-1.fc33 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch
Mailing List;Patch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html
[SECURITY] [DLA 2685-1] squid3 security updateMailing List;Third Party Advisory
-
https://github.com/squid-cache/squid/security/advisories/GHSA-572g-rvwr-6c7f
SQUID-2021:5 Denial of Service in HTTP Response processing · Advisory · squid-cache/squid · GitHubPatch;Third Party Advisory
Jump to